Strategy: Page 19


  • Close-up Focus on Person's Hands Typing on the Desktop Computer Keyboard
    Image attribution tooltip
    gorodenkoff via Getty Images
    Image attribution tooltip

    GitHub to begin rollout of 2FA security upgrade for developers

    The enhancement is part of a wider series of security measures following a series of malicious cyberattacks.

    By March 9, 2023
  • An illustration of a stock market graph and bar chart price display.
    Image attribution tooltip
    maciek905 via Getty Images
    Image attribution tooltip

    CrowdStrike grows subscriber base as customers consolidate security services

    CEO George Kurtz took more shots at Microsoft as CrowdStrike draws customers looking to eliminate multiple vendors.

    By March 9, 2023
  • Empty interior of modern security system control room with workstations with multiple displays and big screens mounted on the wall. Explore the Trendline
    Image attribution tooltip
    .shock via Getty Images
    Image attribution tooltip
    Trendline

    Risk Management

    An esclation of cyber risks facing businesses and government has made cyber resilience a major priority. 

    By Cybersecurity Dive staff
  • Person pushing large stone uphill
    Image attribution tooltip
    Nastco via Getty Images
    Image attribution tooltip

    How will the government enforce the national cyber strategy?

    Efforts to enact laws and regulations that impose greater responsibility on the technology sector aren’t likely to come quick or easy.

    By March 8, 2023
  • Close-up Focus on Person's Hands Typing on the Desktop Computer Keyboard. Screens Show Coding Language User Interface.
    Image attribution tooltip
    gorodenkoff via Getty Images
    Image attribution tooltip

    Organizations tempt risk as they deploy code more frequently

    An imbalance between developers and security professionals on staff spotlights a disconnect between these business functions and objectives.

    By March 7, 2023
  • Post-its on a glass wall
    Image attribution tooltip
    Hispanolistic via Getty Images
    Image attribution tooltip

    LastPass aftermath leaves long to-do list for business customers

    Organizations using the password manager are exposed after a major breach compromised credentials and, potentially, business secrets.

    By March 6, 2023
  • The sun rises near the White House in Washington, DC.
    Image attribution tooltip
    Zach Gibson via Getty Images
    Image attribution tooltip

    White House releases national cyber strategy, shifting security burden

    The long-anticipated policy will push the technology industry to shoulder more of the load for cyber risk, while promoting long-term investments and global cooperation against common threats. 

    By March 2, 2023
  • A long curved desk with banks of computer monitors mounted on the wall.
    Image attribution tooltip
    tonymelony via Getty Images
    Image attribution tooltip

    An ongoing SOC skills shortage could spell trouble for compliance

    Without skilled analysts to monitor the SOC, the risk of a successful cyberattack breaking through a company’s defenses grows. 

    By Sue Poremba • March 1, 2023
  • Jen Easterly, CISA director, Black Hat keynote
    Image attribution tooltip
    Samantha Schwartz/Cybersecurity Dive
    Image attribution tooltip

    3 CISA principles for secure by design

    The Biden administration is expected to emphasize safer development practices when it rolls out the national security strategy for cyber. 

    By Feb. 28, 2023
  • Gulls swarm to eat fishing waste from vessel.
    Image attribution tooltip
    Matt Cardy / Stringer via Getty Images
    Image attribution tooltip

    Attackers reduce complexity to catch more potential victims

    Palo Alto Networks warns attackers are building economies of scale by conducting more efficient operations and complementing their skills with commercially available tools.

    By Feb. 23, 2023
  • Save money concept.Cutting costs. Financial themes.US$100 US Dollars. Economic crisis, deflation.Financial constraints.Cut budget inputs.Discounted products
    Image attribution tooltip
    Huang Evan via Getty Images
    Image attribution tooltip

    6 stories that show the state of security spending and risk

    In an effort to shore up business technology, organizations are investing more in security, but there is a limit to how much those budgets can grow.

    By Naomi Eide • Feb. 21, 2023
  • A worker types lines of code in a laptop with a dark screen.
    Image attribution tooltip
    gorodenkoff via Getty Images
    Image attribution tooltip

    GitHub Copilot for Business, now in public release, weaves in security

    The coding tool includes AI-based security capabilities, automatically blocking common insecure code suggestions.

    By Lindsey Wilkinson • Feb. 17, 2023
  • A man looks at lines of code depicted on a computer screen
    Image attribution tooltip
    sestovic via Getty Images
    Image attribution tooltip

    Companies grapple with post-breach disclosure risks

    The concerns leading organizations to withhold information are aplenty, including reputational damage and financial impacts.

    By Feb. 16, 2023
  • A digital padlock icon on a virtual interface screen
    Image attribution tooltip
    KanawatTH via Getty Images
    Image attribution tooltip

    IT security budgets triple as businesses confront more cyberattacks across Europe, US

    Five-year data from Hiscox shows businesses are facing more frequent and more costly attacks.

    By Feb. 16, 2023
  • A group of employees work together seriously in an office
    Image attribution tooltip
    NoSystem Images via Getty Images
    Image attribution tooltip

    Cybersecurity jobs least likely to be impacted by economic uncertainty, (ISC)2 says

    A series of high-profile and damaging cyberattacks has underscored the critical role cybersecurity teams play, and top brass are taking notice.

    By Feb. 16, 2023
  • Abstract planet made up of squares.
    Image attribution tooltip
    Gegham Qalajyan via Getty Images
    Image attribution tooltip

    Liberty Mutual launches global cyber office

    The office will bring a multidisciplinary approach to cyber risk just as the global insurance industry sees signs of clarity amid a turbulent market for cyber.

    By Feb. 14, 2023
  • Coin stacks sitting on blue financial graph background.
    Image attribution tooltip
    MicroStockHub via Getty Images
    Image attribution tooltip

    Economic volatility to exacerbate cyber risk in 2023

    A potential recession could lead to delayed innovation and inadequate budgets for long-term investments, the Bipartisan Policy Center said in a report.

    By Feb. 14, 2023
  • zero trust
    Image attribution tooltip
    iStock via Getty via Getty Images
    Image attribution tooltip
    Opinion

    Zero trust is moving from hype to reality

    Organizations must plan ahead and invest in people and resources to succeed with zero trust, writes Gartner analyst John Watts. 

    By John Watts • Feb. 10, 2023
  • Looking upward at skyscrapers.
    Image attribution tooltip
    aiisha5 via Getty Images
    Image attribution tooltip

    On deck for the business of cybersecurity: Fire sales and due diligence

    Enterprise cybersecurity is navigating market turmoil and vendor consolidation. Here’s what experts expect to happen to the industry in 2023.

    By Naomi Eide , , Jan. 31, 2023
  • Box CEO Aaron Levie
    Image attribution tooltip
    Justin Sullivan/Getty Images via Getty Images
    Image attribution tooltip

    Box CEO on the ‘perfect storm’ of challenges in cybersecurity

    “These are very, very complicated, dynamic, chaotic times on the security front,” Aaron Levie said.

    By Jan. 31, 2023
  • Microsoft signage displayed
    Image attribution tooltip
    Jeenah Moon via Getty Images
    Image attribution tooltip

    Microsoft surpasses $20B in security revenue as enterprise customers consolidate

    The company’s cybersecurity business is growing, but CEO Satya Nadella warned that customers, in an uncertain economy, are exercising caution.

    By Jan. 30, 2023
  • Man sits in an office with technical instruments in the background.
    Image attribution tooltip
    Naomi Eide/Cybersecurity Dive
    Image attribution tooltip
    Deep Dive

    A first-hand look inside Walmart’s robust security operations

    The retail behemoth invited a handful of journalists to its tech offices in Bentonville, Arkansas. The scope of Walmart’s operations speaks to the lengths enterprises must go to remain secure. 

    By Naomi Eide • Jan. 30, 2023
  • Double exposure shot of backside of a computer and red binary codes.
    Image attribution tooltip
    Suebsiri via Getty Images
    Image attribution tooltip
    Opinion

    Battle of the breach: Prioritizing proactive ransomware defense

    Industry will soon face a reality where organizations are attacked every two seconds by threat actors that continue to evolve. So now what?

    By Sebastian Goodwin • Jan. 25, 2023
  • A group of co-workers surround a computer screen
    Image attribution tooltip
    Yuri Arcurs via Getty Images
    Image attribution tooltip

    Only half of companies have the budgets necessary to mitigate cybersecurity risks: study

    A report from Neustar shows macroeconomic pressures are leading to a squeeze on IT security spending.

    By Jan. 24, 2023
  • Picture of a cybersecurity lock
    Image attribution tooltip
    iStock via Getty Images
    Image attribution tooltip

    Cyber, business interruption remain top global corporate risks

    Risk management leaders remain highly concerned about the threat of malicious attacks and data breaches, according to Allianz Global.

    By Jan. 18, 2023
  • A man faces multiple computer screens.
    Image attribution tooltip
    South_agency via Getty Images
    Image attribution tooltip

    A ransomware negotiator shares 3 tips for victim organizations

    This is no time for knee-jerk reactions. “Take a deep breath and slow things down,” said Drew Schmitt, principal threat intelligence analyst at GuidePoint Security.

    By Jan. 18, 2023